{"id":3420,"date":"2023-04-21T11:54:36","date_gmt":"2023-04-21T09:54:36","guid":{"rendered":"https:\/\/www.b2c-engineering.com\/?p=3420"},"modified":"2023-05-11T18:00:50","modified_gmt":"2023-05-11T16:00:50","slug":"technical-skills-industrial-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/","title":{"rendered":"Our technical skills: Industrial Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3420\" class=\"elementor elementor-3420 elementor-3400\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b262b9e elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b262b9e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ba50bfc\" data-id=\"ba50bfc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4516fc8 elementor-widget elementor-widget-heading\" data-id=\"4516fc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">At the heart of our expertise in Industrial Cybersecurity<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9a5822 elementor-widget elementor-widget-text-editor\" data-id=\"e9a5822\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>B2C Engineering focuses on the integration of innovative and sustainable solutions taking into account the needs and constraints, especially financial, of our industrial customers.<\/p><p>For each need in industrial cybersecurity, B2C Engineering applies a procedure of <strong>security of your production tools<\/strong> against possible threats or disturbances.<\/p><p>Our teams, <strong>trained and certified<\/strong> with the leaders of the market as <strong>Esia, Stormshield, Darktrace or Octoplant<\/strong>, realize <strong>security audits<\/strong> within your company and accompany you in the choice of<strong> the most adapted solutions<\/strong> for the protection of your industrial network. Our objective is to help you <strong>optimize the protection and management of your data<\/strong> in order to make you more competitive and efficient.<\/p><p>Zoom on the redesign of an IoT network for one of our customers in the chemical sector.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-54adebf\" data-id=\"54adebf\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:30,&quot;end&quot;:65}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;],&quot;motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]}}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f85c64 elementor-widget elementor-widget-image\" data-id=\"9f85c64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1600\" height=\"1065\" src=\"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie.jpg\" class=\"attachment-full size-full wp-image-1104\" alt=\"\" srcset=\"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie.jpg 1600w, https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie-300x200.jpg 300w, https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie-1024x682.jpg 1024w, https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie-768x511.jpg 768w, https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/08\/01-cybersecurite-industrie-1536x1022.jpg 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-450195c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"450195c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-259f406\" data-id=\"259f406\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4f17cf elementor-widget elementor-widget-heading\" data-id=\"a4f17cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The technical project<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2abddee elementor-widget elementor-widget-heading\" data-id=\"2abddee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description of the project<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89a27bd elementor-widget elementor-widget-text-editor\" data-id=\"89a27bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our customer has chosen to completely revise its OT network, which <strong>interconnects the equipment<\/strong> in its various production units. This choice is part of a <strong>global approach to improve the scalability and security<\/strong> of its OT network.<\/p><p>This is also motivated by the following needs:<\/p><p>To make the OT network independent of the IT network for greater flexibility<br \/>Respond to the technological and future evolutions of Industry 4.0<br \/>To protect oneself as well as possible from possible cyber attacks<br \/>To frame the risk management<\/p><p>Our customer chose B2C Engineering in order to deepen a first study in cybersecurity which had been realized and to propose a concrete and budgeted action plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1597f2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1597f2e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61ba02a\" data-id=\"61ba02a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb885b0 elementor-widget elementor-widget-heading\" data-id=\"cb885b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Scope of supply<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3097903 elementor-widget elementor-widget-text-editor\" data-id=\"3097903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We were able to meet our client&#8217;s needs by relying on our following strengths:<\/p><ul><li>Knowledge of the <strong>automation business<\/strong><\/li><li>Knowledge of <strong>IoT networks<\/strong><\/li><li><strong>Expertise in cybersecurity<\/strong><\/li><li>Knowledge of <strong>current standards<\/strong> in terms of cybersecurity<\/li><li>Presence and support of <strong>our partners and suppliers in industrial IT equipment<\/strong><\/li><\/ul><p>\u00a0<\/p><p>This IoT network will connect <strong>14 production units<\/strong>, spread over a site that is almost 2 km long. It will be made up of <strong>redundant fiber optic links<\/strong>, connecting the IT racks of each site, which are themselves made up of <strong>switches and firewalls<\/strong>. These computer bays will be the connection points for each unit.<\/p><p>The connections to the final equipment (PLC, DCS, &#8230;) will be realized in a later phase.<\/p><p>The B2C team mandated for this project proceeded to :<\/p><ul><li><strong>The supply and installation of the IT equipment<\/strong><ul><li>14 computer racks<\/li><li>30 Firewalls Stormshield<\/li><li>42 Siemens switches<\/li><\/ul><\/li><li><strong>Testing of the solution in our premises<\/strong><\/li><li><strong>Commissioning of the OT network<\/strong><\/li><li><strong>Updating the customer&#8217;s governance rules<\/strong><\/li><li><strong>Training of CS personnel<\/strong><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-898bddc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"898bddc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bfd1995\" data-id=\"bfd1995\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a651ab elementor-widget elementor-widget-heading\" data-id=\"6a651ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Gains for clients<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2febc19 elementor-widget elementor-widget-text-editor\" data-id=\"2febc19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Thanks to the redesign of its network, our client benefits from :<\/p><ul><li><strong>New Industry 4.0 ready OT network<\/strong><\/li><li>Extensive network <strong>expansion possibilities<\/strong> (HW and SW)<\/li><li>More <strong>flexibility<\/strong> in network management (IT independent)<\/li><li><strong>In-house cybersecurity expertise<\/strong> (training by B2C)<\/li><li><strong>Quality, up-to-date and recognized hardware<\/strong> (Stormshield is certified by ANSSI)<\/li><li><strong>High availability network<\/strong> thanks to the redundancy of the links, the IT equipment and the protocols used<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a836e97 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a836e97\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4654de8\" data-id=\"4654de8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-02a517d elementor-widget elementor-widget-text-editor\" data-id=\"02a517d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Discover our other partners and find all our expertise on our page dedicated to Industrial Cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-068e3e7 elementor-widget elementor-widget-button\" data-id=\"068e3e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.b2c-engineering.com\/en\/industrial-cybersecurity\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Our CSI skills<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d29bfd2\" data-id=\"d29bfd2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Discover our technical skills through projects realized by our Belgian and French teams through a CSI realization for one of our customers in the pharmaceutical sector.<\/p>\n","protected":false},"author":7,"featured_media":3408,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-3420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Our technical skills: Industrial Cybersecurity - B2C Engineering<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Our technical skills: Industrial Cybersecurity - B2C Engineering\" \/>\n<meta property=\"og:description\" content=\"Discover our technical skills through projects realized by our Belgian and French teams through a CSI realization for one of our customers in the pharmaceutical sector.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"B2C Engineering\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-21T09:54:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T16:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Emilie Fenoul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emilie Fenoul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/\"},\"author\":{\"name\":\"Emilie Fenoul\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#\\\/schema\\\/person\\\/b7fdc3b92adbfc40d0fadd9b675c2427\"},\"headline\":\"Our technical skills: Industrial Cybersecurity\",\"datePublished\":\"2023-04-21T09:54:36+00:00\",\"dateModified\":\"2023-05-11T16:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/\"},\"wordCount\":509,\"publisher\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/image-metier-CSI.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/\",\"name\":\"Our technical skills: Industrial Cybersecurity - B2C Engineering\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/image-metier-CSI.png\",\"datePublished\":\"2023-04-21T09:54:36+00:00\",\"dateModified\":\"2023-05-11T16:00:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/image-metier-CSI.png\",\"contentUrl\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/image-metier-CSI.png\",\"width\":350,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/technical-skills-industrial-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our technical skills: Industrial Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/\",\"name\":\"B2C Engineering\",\"description\":\"Creating Smart Factories Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#organization\",\"name\":\"B2C Engineering\",\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/logo-B2C-engineering.svg\",\"contentUrl\":\"https:\\\/\\\/www.b2c-engineering.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/logo-B2C-engineering.svg\",\"caption\":\"B2C Engineering\"},\"image\":{\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/#\\\/schema\\\/person\\\/b7fdc3b92adbfc40d0fadd9b675c2427\",\"name\":\"Emilie Fenoul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g\",\"caption\":\"Emilie Fenoul\"},\"url\":\"https:\\\/\\\/www.b2c-engineering.com\\\/en\\\/author\\\/emilie\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Our technical skills: Industrial Cybersecurity - B2C Engineering","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Our technical skills: Industrial Cybersecurity - B2C Engineering","og_description":"Discover our technical skills through projects realized by our Belgian and French teams through a CSI realization for one of our customers in the pharmaceutical sector.","og_url":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/","og_site_name":"B2C Engineering","article_published_time":"2023-04-21T09:54:36+00:00","article_modified_time":"2023-05-11T16:00:50+00:00","og_image":[{"width":350,"height":350,"url":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png","type":"image\/png"}],"author":"Emilie Fenoul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Emilie Fenoul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/"},"author":{"name":"Emilie Fenoul","@id":"https:\/\/www.b2c-engineering.com\/en\/#\/schema\/person\/b7fdc3b92adbfc40d0fadd9b675c2427"},"headline":"Our technical skills: Industrial Cybersecurity","datePublished":"2023-04-21T09:54:36+00:00","dateModified":"2023-05-11T16:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/"},"wordCount":509,"publisher":{"@id":"https:\/\/www.b2c-engineering.com\/en\/#organization"},"image":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/","url":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/","name":"Our technical skills: Industrial Cybersecurity - B2C Engineering","isPartOf":{"@id":"https:\/\/www.b2c-engineering.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png","datePublished":"2023-04-21T09:54:36+00:00","dateModified":"2023-05-11T16:00:50+00:00","breadcrumb":{"@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#primaryimage","url":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png","contentUrl":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2023\/04\/image-metier-CSI.png","width":350,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/www.b2c-engineering.com\/en\/technical-skills-industrial-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.b2c-engineering.com\/en\/"},{"@type":"ListItem","position":2,"name":"Our technical skills: Industrial Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.b2c-engineering.com\/en\/#website","url":"https:\/\/www.b2c-engineering.com\/en\/","name":"B2C Engineering","description":"Creating Smart Factories Together","publisher":{"@id":"https:\/\/www.b2c-engineering.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.b2c-engineering.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.b2c-engineering.com\/en\/#organization","name":"B2C Engineering","url":"https:\/\/www.b2c-engineering.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.b2c-engineering.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/03\/logo-B2C-engineering.svg","contentUrl":"https:\/\/www.b2c-engineering.com\/wp-content\/uploads\/2022\/03\/logo-B2C-engineering.svg","caption":"B2C Engineering"},"image":{"@id":"https:\/\/www.b2c-engineering.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.b2c-engineering.com\/en\/#\/schema\/person\/b7fdc3b92adbfc40d0fadd9b675c2427","name":"Emilie Fenoul","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9fb45623987a6008a7c540ffb7d7f7b628be739dd04faf0658e3185f7511b58?s=96&d=mm&r=g","caption":"Emilie Fenoul"},"url":"https:\/\/www.b2c-engineering.com\/en\/author\/emilie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/posts\/3420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/comments?post=3420"}],"version-history":[{"count":5,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/posts\/3420\/revisions"}],"predecessor-version":[{"id":3451,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/posts\/3420\/revisions\/3451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/media\/3408"}],"wp:attachment":[{"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/media?parent=3420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/categories?post=3420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.b2c-engineering.com\/en\/wp-json\/wp\/v2\/tags?post=3420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}